FYI

On Tue, Apr 8, 2014 at 8:25 PM, Moritz Muehlenhoff <[email protected]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-2897-1                   [email protected]
> http://www.debian.org/security/                        Moritz Muehlenhoff
> April 08, 2014                         http://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : tomcat7
> CVE ID         : CVE-2013-2067 CVE-2013-2071 CVE-2013-4286 CVE-2013-4322
>                  CVE-2014-0050
>
> Multiple security issues were found in the Tomcat servlet and JSP engine:
>
> CVE-2013-2067
>
>     FORM authentication associates the most recent request requiring
>     authentication with the current session. By repeatedly sending a
> request
>     for an authenticated resource while the victim is completing the login
>     form, an attacker could inject a request that would be executed using
> the
>     victim's credentials.
>
> CVE-2013-2071
>
>     A runtime exception in AsyncListener.onComplete() prevents the request
> from
>     being recycled. This may expose elements of a previous request to a
> current
>     request.
>
> CVE-2013-4286
>
>     Reject requests with multiple content-length headers or with a
> content-length
>     header when chunked encoding is being used.
>
> CVE-2013-4322
>
>     When processing a request submitted using the chunked transfer
> encoding,
>     Tomcat ignored but did not limit any extensions that were included.
> This allows
>     a client to perform a limited denial of service. by streaming an
> unlimited amount
>     of data to the server.
>
> CVE-2014-0050
>
>     Multipart requests with a malformed Content-Type header could trigger
> an
>     infinite loop causing a denial of service.
>
> For the stable distribution (wheezy), these problems have been fixed in
> version 7.0.28-4+deb7u1.
>
> For the testing distribution (jessie), these problems have been fixed in
> version 7.0.52-1.
>
> For the unstable distribution (sid), these problems have been fixed in
> version 7.0.52-1.
>
> We recommend that you upgrade your tomcat7 packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: http://www.debian.org/security/
>
> Mailing list: [email protected]
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQIcBAEBAgAGBQJTRD6+AAoJEBDCk7bDfE42EiwQALiEq9OFVnW5Wf6HP4dWFvpc
> OsVvWZweakr5gqXmsQRqxXbDSzFhu3w88ntLhoKjQ5aH785V0hb70msEqxzAH8Hq
> idxUug0fjsxD0+YgLSSRnloOxpQC0GpLNBt55/ZFiVFctjlxEbKYOsfcF7HSqm5t
> 1ROWW8AyYwnoJq0KSeMwxwKFvZ+x4w5PrvOtqB/yzJYrS+Zom5iDY+eEXh47CePV
> J/2FVlff0TyQt3RaRR+c6eqnYRTsLoF22MXS3BXKOJOxcmdBpWjS75pj01FcPsTU
> tkOAyYu7e180hnsBDAA4R4w2LdxJOOty87GkucXH2PXBndhkmk0acyGeaBlgW2bM
> kKqd0Xp5av4TpgecsAo0/hblwXQ18lNHJB82u/d80/zaWPf6+bAizMsCCHwp8uY7
> 71m2h1doKiuuZe6Dd1Tluq5OzyN0eiwwnFfY3PwYf+TfuH/olw1R99R3/wmMieQ7
> t/EaJZgJFnya2iKrkI/S9di2MVnOijT9lmvp7qaNYSWCS9QRtyy0CWEw45z5884R
> QQFl0Or5W+WcWj5cs9FR2mXJ3PRQ5sRGwe6Ng5OYhuct6gZWj9vZhZ/CjxyCG9Fm
> UPLWClmWh8V6HPKCovBLM5KK9lLX+KUnadO75+2E30H2UmgZLcj/O/CgFWYpw/N9
> BR/VhLvF6TzVyMJOtk8E
> =uwle
> -----END PGP SIGNATURE-----
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact
> [email protected]
> Archive:
> https://lists.debian.org/[email protected]
>
>

Reply via email to